Term
|
Definition
Mobile worker to business site |
|
|
Term
|
Definition
Encrypts the original header and creates a new header |
|
|
Term
What is provided by AH when using IPSec? |
|
Definition
|
|
Term
What does ESP provide that AH alone can't? |
|
Definition
|
|
Term
ESP and AH cannot be used simultaneously? T/F? |
|
Definition
|
|
Term
|
Definition
Established bidirectional IKE SA Authenticate peer |
|
|
Term
|
Definition
Negotiates IPSec policies When complete, unidirectional IPSec SAs are established for each protocol/algorithm combination Transform sets are negotiated |
|
|
Term
What is the purpose of the Crypto ACL? |
|
Definition
To determine what traffic will be tunneled and what will be sent in planin text to the appropriate next hop |
|
|
Term
The crypto ACLs on both ends of a VPN tunnel should have what relationship? |
|
Definition
They should be mirror images of each other |
|
|
Term
SSL remote access VPN characteristics |
|
Definition
No client software reuuired Works for a limited number of applications such as web-browsing and email |
|
|
Term
IPSec remote access VPN characteristics |
|
Definition
Works for all IP-based applications Clients must have specialized software Has a stronger auth method The stronger security method |
|
|
Term
What type of VPN assigns host pc a new IP address |
|
Definition
|
|
Term
|
Definition
Adding a static route entry for a PC when using remote access VPNs |
|
|